TanStack npm supply chain attacked by Mini Shai-Hulud, version 84 injected with credentials to steal code

MarketWhisper
BTC-0.08%
ETH-0.55%
ZEC5.69%

Mini Shai-Hulud攻擊

According to a report by Step Security on May 11, the threat group TeamPCP launched a new round of supply-chain worm attacks named “Mini Shai-Hulud,” compromising 84 versions of TanStack npm packages and implanting malicious code, targeting the theft of CI/CD environment credentials. Socket Security marked all malicious versions within six minutes of the release.

Attack Method and Propagation Mechanism

TanStack npm遭攻擊 (Source: Socket Security)

According to Step Security’s analysis, the attack used a three-stage process: on May 10, 2026, the attackers created a TanStack/router branch using the GitHub account voicproducoes (ID: 269549300, created on March 19, 2026), and injected a malicious payload; then injected the payload into already-published npm compressed packages; finally, using the hijacked OIDC token, it published through the GitHub Actions release pipeline of the TanStack project itself, releasing malicious versions with SLSA Build Level 3 certification.

According to Step Security’s report, Mini Shai-Hulud is a true self-propagating worm: after stealing credentials from a CI/CD pipeline, it automatically enumerates all packages controlled by the same maintainer and sequentially publishes infected versions. Step Security’s report states this is the first recorded malicious npm worm capable of generating valid SLSA certification.

Core Capabilities of the Malicious Code

According to Step Security and Socket Security’s analysis, the 2.3 MB obfuscated payload (SHA-256: ab4fcadaec49c03278063dd269ea5eef82d24f2124a8e15d7b90f2fa8601266c) embedded in the infected packages has the following core capabilities:

Memory scraping: Directly reads the GitHub Actions Runner.Worker process memory via /proc/{pid}/mem to extract all keys, including masked keys

Credential document collection: Collects credentials from more than 100 hardcoded paths, covering AWS / Azure / GCP cloud credentials, SSH keys, npm tokens, cryptocurrency wallets (Bitcoin, Ethereum, Monero, Zcash, Exodus, Electrum, etc.), AI tool configurations (Claude, Kiro), and instant messaging application data

Persistence: Installs persistence hooks at the Claude Code, VS Code, and operating system levels (macOS LaunchAgent / Linux systemd service), remaining effective after reboot

Data exfiltration: Exfiltrates encrypted data through a dual-channel approach—Session Protocol CDN (filev2.getsession.org) and GitHub GraphQL API dead dropboxes (submitting disguised as claude@users.noreply.github.com)

Ransom threats: Embeds the string “IfYouRevokeThisTokenItWillWipeTheComputerOfTheOwner” in the description of newly created npm tokens; revoking the tokens triggers a destructive wipe routine

Main Intrusion Indicators (IOCs)

According to Step Security’s report, the main intrusion indicators for this attack are as follows:

Malicious payload hash value (SHA-256):router_init.js = ab4fcadaec49c03278063dd269ea5eef82d24f2124a8e15d7b90f2fa8601266c

C2 network domains:api.masscan.cloud、filev2.getsession.org、git-tanstack.com、seed1.getsession.org

Attacker GitHub account:voicproducoes (ID: 269549300, email voicproducoes@gmail.com)

Malicious commit:79ac49eedf774dd4b0cfa308722bc463cfe5885c (TanStack/router branch)

The main affected package versions include @tanstack/react-router (1.169.5, 1.169.8), @tanstack/router-core (1.169.5, 1.169.8), and more than 40 TanStack package versions, as well as related packages from organizations such as UiPath, DraftLab, etc.; the full list is continuously updated by Step Security.

Emergency Response Recommendations

According to Step Security’s report, if affected versions are already installed, Step Security recommends:

Immediately clean the affected versions from the lock files and reinstall clean versions; rotate all credentials accessible in CI/CD environments (GitHub tokens, npm tokens, cloud API keys); remove persistence files (.claude/router_runtime.js, .vscode/setup.mjs, etc.); and if the device has cryptocurrency wallet files, immediately transfer funds to new wallet addresses. Step Security specifically warns: before isolating and mirroring the affected devices for forensic analysis, do not revoke npm tokens containing the ransom-threat string.

FAQ

When and by whom was the Mini Shai-Hulud worm discovered?

According to Step Security’s May 11, 2026 report, the attack was detected by an analyst from the StepSecurity AI suite and initiated by the threat group TeamPCP. Socket Security issued a warning on May 12, 2026 on the X platform, stating that all malicious versions had been marked within six minutes after publication.

What technical innovations does this supply-chain attack have?

According to Step Security’s report, Mini Shai-Hulud is the first recorded npm worm that can hijack OIDC tokens and leverage a legitimate Sigstore protocol stack to generate valid SLSA Build Level 3 certification for malicious packages, making the infected versions appear legitimate during standard supply-chain security checks.

How can cryptocurrency wallet users confirm whether they are affected?

According to Step Security’s report, the malicious code targets desktop wallets including Bitcoin (/.bitcoin/wallet.dat), Ethereum (/.ethereum/keystore/*), Monero, Zcash, and Exodus and Electrum. If the device has installed affected versions, Step Security recommends immediately transferring the relevant cryptocurrency wallet funds to new wallet addresses.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

A Telegram username sold for a million-dollar price triggers a forged USDT phishing attack

According to Bits.media, reported on May 13, multiple Telegram usernames and virtual vanity numbers were sold on the Fragment auction platform at record-high TON token prices; within a few hours after the trades, the attacker launched a forged USDT attack on users of the TON blockchain NFT trading platform Getgems. A Chinese collector reportedly lost more than $800k in a virtual-number code. Fragment Platform Vanity Number Deal Records According to Bits.media, the major completed deals on the Fr

MarketWhisper52m ago

Telegram Usernames Sell for Record $2.1 Million in TON, Followed by Phishing Attacks

According to Bits.media, Telegram usernames and premium numbers sold for record-high prices in TON tokens on May 13, with @danbao fetching 1.58 million TON (approximately $2.1 million) from an anonymous buyer last weekend, marking the platform's highest transaction. Other premium numbers

GateNews1h ago

Aave and Kelp Complete First Step of rsETH Recovery, Destroy 117,132 rsETH on Arbitrum

According to ChainCatcher, Aave and Kelp have completed the first phase of their rsETH recovery plan, destroying attacker-held rsETH on Arbitrum. Over the coming days, the parties will gradually replenish funds to LayerZero's OFT adapter and phase in the restart of rsETH operations, with 117,132 rsE

GateNews3h ago

Bitcoin Network Flooded With 200,000 Fake Node Addresses Since April 9, Sparking Sybil Attack Concerns

According to Bitcoin developer Jameson Lopp, roughly 200,000 unreachable node addresses have been flooding Bitcoin's peer-to-peer network since April 9, 2026, raising concerns about a potential Sybil-style attack. The anomaly caused ADDR messages—the protocol nodes use to share peer addresses—to

GateNews7h ago

The U.S. DOJ charges three men from Tennessee for cross-state wrench attacks: robbed a California crypto holder of $6.5 million

The U.S. Department of Justice on May 12 filed federal charges against three Tennessee men: Elijah Armstrong, Nino Chindavanh, and Jayden Rucker. The three allegedly crossed state lines into California from November to December 2025, disguised themselves as delivery workers to break into the homes of cryptocurrency holders, then after restricting the victims’ movements with firearms, zip ties, and tape, forced them to transfer crypto assets, with the single largest amount reaching $6.5 million.I

ChainNewsAbmedia13h ago

Aurellion Suffers Attack, 455,003 USDC Drained Today

According to Slow Mist, decentralized shipping project Aurellion suffered an attack today (May 12), with attackers gaining control of the Diamond contract and draining 455,003 USDC from multiple authorized victim

GateNews16h ago
Comment
0/400
No comments